HowtoForge provides user-friendly Linux tutorials.
-
Data Recovery With TestDisk
Author: Falko Timme • Tags: other, debian • Comments: 11Data Recovery With TestDisk TestDisk is a powerful free data recovery software which was primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting your partition table). TestDisk is available for lots of operating systems, including Linux, Windows, and MacOS, and supports lots of filesystems.
-
How to Avoid Being Blacklisted
Author: alinap • Tags: antivirus, linux, security • Comments: 2How to Avoid Being Blacklisted A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.
-
TrueCrypt Tutorial: Truly Portable Data Encryption
Author: lipiec • Tags: security • Comments: 9TrueCrypt Tutorial: Truly Portable Data Encryption TrueCrypt is a free software that encrypts data “on-the-fly”. Right now the newest version released is version 4.3. You can create an encrypted hard drive, a separate partition or a directory with TrueCrypt. It doesn’t simply encrypt the content of files, but their names and the names of the directories they are in as well. Moreover there is no way to check the size of the encrypted directory/HDD/partition. TrueCrypt is available for Windows and Linux.
-
-
Installing ModSecurity2 On Debian Etch
Author: Falko Timme • Tags: apache, debian, security • Comments: 15Installing ModSecurity2 On Debian Etch This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.
-
Network Card Bonding On CentOS
Author: zordo • Tags: centos • Comments: 11Network Card Bonding On CentOS Bonding is the same as port trunking. In the following I will use the word bonding because practically we will bond interfaces as one. Bonding allows you to aggregate multiple ports into a single group, effectively combining the bandwidth into a single connection. Bonding also allows you to create multi-gigabit pipes to transport traffic through the highest traffic areas of your network. For example, you can aggregate three megabits ports into a three-megabits trunk port. That is equivalent with having one interface with three megabytes speed.
-
Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop
Author: Falko Timme • Tags: desktop, fedora • Comments: 3Installing Beryl Or Compiz Fusion On A Fedora 7 Desktop This tutorial shows how you can install and use Beryl or Compiz Fusion on a Fedora 7 desktop (the system must have a 3D-capable graphics card). With both Beryl and Compiz Fusion, you can make your desktop use beautiful 3D effects like wobbly windows or a desktop cube.
-
Virtual Hosting With vsftpd And MySQL On Debian Etch
Author: Falko Timme • Tags: debian, ftp • Comments: 15
Virtual Hosting With vsftpd And MySQL On Debian Etch Vsftpd is one of the most secure and fastest FTP servers for Linux. Usually vsftpd is configured to work with system users. This document describes how to install a vsftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine.
-
Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch
Author: Falko Timme • Tags: debian, monitoring, postfix • Comments: 4
Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch This article describes how you can monitor your Postfix mailserver with the tools Mailgraph and pflogsumm. Mailgraph creates daily, weekly, monthly, and yearly graphs of sent, received, bounced, and rejected emails and also of spam and viruses, if SpamAssassin and ClamAV are integrated into Postfix (e.g. using amavisd-new). These graphs can be accessed with a browser, whereas pflogsumm ("Postfix Log Entry Summarizer") can be used to send reports of Postfix activity per email.
-
Configuring Samba 3.0 To Use The ADS Security Mode (CentOS)
Author: fahdaziz • Tags: samba, centos • Comments: 5Configuring Samba 3.0 To Use The ADS Security Mode (CentOS) The intent of this article is to show you how to configure your Linux machine and Samba server to participate in a Windows 2003 Active Directory domain as a Member Server using Kerberos authentication. This involves using the security = ADS security mode in Samba.
-
Installing And Working With Xoops Under Ubuntu 6.10
Author: jfheins • Tags: php, ubuntu • Comments: 0Installing And Working With Xoops Under Ubuntu 6.10 I want to show you how to install Xoops on Ubuntu. I used the Ubuntu 6.10 Server Edition, but it will probably work on other systems as well. Xoops is a modern Content-Management-System which can be extended with a variety of modules.